Home | Amazing | Today | Tags | Publishers | Years | Search 
The Cambridge Economic History of the United States, Vol. 3: The Twentieth Century (Volume 3)
The Cambridge Economic History of the United States, Vol. 3: The Twentieth Century (Volume 3)

Volume 3 surveys the economic history of the United States, Canada, and the Caribbean during the twentieth century. Its chapters trace the century's major events, notably the Great Depression and the two world wars, as well as its long-term trends, such as changing technology, the rise of the corporate economy, and the development of...

American Cars 1946-1959: Every Model, Year by Year
American Cars 1946-1959: Every Model, Year by Year

From the resumption of automobile production at the close of World War II through the 1950s, the American auto industry would see the births and deaths of several manufacturers, great technological advances, and an era of dramatic styling as a prospering nation asserted its growing mobility. Cars of this period are among the most iconic...

The Agile Samurai: How Agile Masters Deliver Great Software
The Agile Samurai: How Agile Masters Deliver Great Software

Get ready to kick some software project butt. By learning the ways of the agile samurai you will discover:

* how to create plans and schedules your customer and your team can believe in

  • what characteristics make a good agile team and how to form your own

  • ...

Muhammad Ali: The Making of an Icon (Sporting)
Muhammad Ali: The Making of an Icon (Sporting)

Muhammad Ali (born Cassius Clay) has always engendered an emotional reaction from the public. From his appearance as an Olympic champion to his iconic status as a national hero, his carefully constructed image and controversial persona has always been intensely scrutinized. In Muhammad Ali, Michael Ezra considers the boxer who...

Air and Spaceborne Radar Systems (Radar, Sonar, Navigation and Avionics)
Air and Spaceborne Radar Systems (Radar, Sonar, Navigation and Avionics)

The history of airborne radar is almost as old as that of radar itself. The improvement in detection range provided by an airborne platform was realised early during the Second World War, and the development of the cavity magnetron at almost the same time allowed higher radar frequencies and, hence, directive antennas to be used. Nowadays,...

Scene of the Cybercrime: Computer Forensics Handbook
Scene of the Cybercrime: Computer Forensics Handbook

"Cybercrime and cyber-terrorism represent a serious challenge to society as a whole." - Hans Christian Krüger, Deputy Secretary General of the Council of Europe
Crime has been with us as long as laws have existed, and modern technology has given us a new type of criminal activity: cybercrime. Computer and
...

Protecting SQL Server Data
Protecting SQL Server Data

For as long as there has been something to communicate between two persons there has been data. Today, vast volumes of it are gathered about almost every individual and business. It is the information that we provide when we sign up for an account at our favorite website, fill out a job application, or apply for a mortgage.

These...

Geeks and Geezers
Geeks and Geezers
We were drawn to thinking and then ultimately writing about geeks and geezers from very different starting points. Coauthoring a book isn’t quite like synchronized swimming. It’s more like gaining perspective and depth through incongruity. Through writing and arguing in what seemed like endless and percussive...
Wireless Crime and Forensic Investigation
Wireless Crime and Forensic Investigation

Security is always a concern with any new technology. When we think security we typically think of stopping an attacker from breaking in or gaining access. However, based on the broad reach of wireless, stopping someone from passively listening is just as critical. Intrusion detection systems, firewalls, and forensics are just a few of the...

Hacker Cracker: A Journey from the Mean Streets of Brooklyn to the Frontiers of Cyberspace
Hacker Cracker: A Journey from the Mean Streets of Brooklyn to the Frontiers of Cyberspace

One of the most gripping yet improbable stories spawned by the computer revolution, Hacker Crocker is a classic American-dream success story set on the razor edge of high technology. Ejovi Nuwere takes the reader on the roller-coaster ride of his extraordinary life, from the bullet-riddled, drugged-out streets of one of America's...

LEGO MINDSTORMS NXT: Mars Base Command (Technology in Action)
LEGO MINDSTORMS NXT: Mars Base Command (Technology in Action)

Congratulations! You’re on Mars Base Alpha, the first human outpost on the red planet. Don’t relax, though. It’s not all roses and unicorns up here. Mars isn’t called "The Bringer of War" for nothing! You’ve just been rained on by a meteor shower and it’s up to you—you!—to put your...

Linear Programming and Network Flows
Linear Programming and Network Flows

Linear Programming deals with the problem of minimizing or maximizing a linear function in the presence of linear inequalities. Since the development of the simplex method by George B. Dantzig in 1947, linear programming has been extensively used in the military, industrial, governmental, and urban planning fields, among others. The...

Result Page: 41 40 39 38 37 36 35 34 33 32 31 30 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy